Abstract is missing.
- Probabilistic Noninterference through Weak Probabilistic BisimulationGeoffrey Smith. 3-13 [doi]
- Secure Contexts for Confidential DataAnnalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi. 14-28 [doi]
- Observational Determinism for Concurrent Program SecuritySteve Zdancewic, Andrew C. Myers. 29 [doi]
- Symbolic Protocol Analysis with Products and Diffie-Hellman ExponentiationJonathan K. Millen, Vitaly Shmatikov. 47-61 [doi]
- A Procedure for Verifying Security Against Type Confusion AttacksCatherine Meadows. 62 [doi]
- Anonymity and Information Hiding in Multiagent SystemsJoseph Y. Halpern, Kevin R. O Neill. 75-88 [doi]
- Understanding SPKI/SDSI Using First-Order LogicNinghui Li, John C. Mitchell. 89 [doi]
- A Derivation System for Security Protocols and its Logical FormalizationAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic. 109-125 [doi]
- Automatic Validation of Protocol NarrationChiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson. 126-140 [doi]
- On Distributed Security Transactions that Use Secure Transport ProtocolsPhilippa J. Broadfoot, Gavin Lowe. 141 [doi]
- Using Access Control for Secure Information Flow in a Java-like LanguageAnindya Banerjee, David A. Naumann. 155-169 [doi]
- Type-Based Distributed Access ControlTom Chothia, Dominic Duggan, Jan Vitek. 170 [doi]
- Using First-Order Logic to Reason about PoliciesJoseph Y. Halpern, Vicky Weissman. 187-201 [doi]
- On Generalized Authorization ProblemsStefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine. 202 [doi]
- Identity Based Authenticated Key Agreement Protocols from PairingsLiqun Chen, Caroline Kudla. 219-233 [doi]
- The Diffie-Hellman Key-Agreement Scheme in the Strand-Space ModelJonathan C. Herzog. 234-247 [doi]
- A Computational Analysis of the Needham-Schröeder-(Lowe) ProtocolBogdan Warinschi. 248 [doi]